Livros e capítulo

URI permanente para esta coleçãohttps://rigalileo.itegam.org.br/handle/123456789/6

Navegar

Resultados da Pesquisa

Agora exibindo 1 - 3 de 3
  • Imagem de Miniatura
    Item
    Uma Proposta Inovadora Utilizando Blockchain para a Gestão Financeira em Obras Públicas, Tendo como Base o Sistema Brasileiro
    (Instituto de Tecnologia e Educação Galileo da Amazônia, 2020) JÚNIOR, Paulo Oliveira Siqueira; CAMPOS, Paola Souto
    The poor investment of funds in public works across different sectors in Brazil is evident due to the concentration of technologies and new methodologies, varying according to the current legislation in each state. This study proposes a blockchain-based methodology to increase confidence in financial data, enabling greater transparency, reliability, and public sector oversight. The blockchain network allows mirroring of revenues and expenses, making financial processes more secure and auditable.
  • Imagem de Miniatura
    Item
    DESENVOLVIMENTO DE SMARTS CONTRACTS E TOKENS NA REDE ETHEREUM
    (Instituto de Tecnologia e Educação Galileo da Amazônia, 2023) ALENCAR, David Barbosa de; LEITE, Jandecy Cabral
    This article explores the development of smart contracts and tokens on the Ethereum network, highlighting the benefits of automation of agreements, elimination of intermediaries, transparency, and security provided by blockchain technology. Challenges such as scalability, privacy, and security are discussed, along with the possibilities of building innovative decentralized applications. The research adopted an approach of collecting primary and secondary data, including interviews with experts and analysis of existing smart contracts.
  • Imagem de Miniatura
    Item
    WIRELESS – ANÁLISE DE VULNERABILIDADES EM REDES DE COMPUTADORES SEM FIO EM UMA EMPRESA DO POLO DUAS RODAS
    (Instituto de Tecnologia e Educação Galileo da Amazônia, 2023) ALENCAR, David Barbosa de; LEITE, Jandecy Cabral
    This article highlights the importance of analyzing vulnerabilities in wireless computer networks to ensure information security and data protection in a specific company. During the project, several vulnerabilities were identified, such as inadequate security configurations, lack of strong authentication, use of outdated encryption protocols, and absence of network segregation. These vulnerabilities represent significant risks to the integrity, confidentiality, and availability of data transmitted and stored in wireless networks. However, through the implementation of appropriate mitigation measures, it is possible to strengthen the security of wireless networks and reduce these risks. It is recommended to update security configurations, such as changing default passwords, using strong encryption, and adopting multi-factor authentication. Additionally, network segregation is essential to protect the internal network against unauthorized access. By following these measures, the company will strengthen the security of its wireless networks, ensuring data protection, information privacy, and business continuity. It is important to emphasize that vulnerability analysis in wireless networks should be an ongoing process, adapting to new threats and technologies, to ensure continuous network security and the protection of the company's information assets.